Fault Tolerance Using Credentials Management in Online Transaction Application

نویسنده

  • L. Javid Ali
چکیده

Web applications play a vital role in the IT field for satisfying the web customer. The customer always depends on the online transaction processing system. The web application has various forms which gives a complete service to the customer. These various forms have options that are used to satisfy the customer’s needs because of the attraction over web sites existing in the global market. The traditional web pages will be closed from the current session whenever the customer selects an improper option because of single sign-on property. Selection of wrong option that is not suitable for the current session will lead to reliability problem. If the same user needs the same service, again he has to navigate from home page to the required page, thus adding up extra burden on customer. The customer session should be maintained properly, so that the customer’s satisfaction is retained over the online web application. The existing system classifies the user with their access level and also their fault level. The main objective of the proposed work is to manage the credential in all levels in order to keep the valuable customer for a long time of access in the current session. The credential management and session management are used to manage a multilevel credential from web client to web resource level and vice versa. The options selected by the customer can be classified based on the fault and type of access. The credential management also performs the maintenance process for fixing the fault tolerance level to the web user. A complete log is recorded to trace the overall process in the online transaction processing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Algorithm for Fault Classification and Identification in Online Transaction Management

Nowadays the customer demand for accessing a web based application has grown enormously as everything is available in the Internet. Sensitive application providers retain their resources in safe from unauthorized access by using single signon technique. In this technique if a user gives an irrelevant information in a particular session, he may be asked to continue the session by using sign on t...

متن کامل

A Middleware Architecture for Supporting Adaptable Replication of Enterprise Application Data

Enterprise-wide data replication improves availability, performance, fault-tolerance and dependability of database services within and between different subunits in medium and large enterprises. The overhead of consistency management of replicated data can be tamed by built-in DBMS functionality. Different kinds of applications, e.g., update-intensive online transaction processing, cyclical upd...

متن کامل

Modeling Fault-Tolerant and Secure Mobile Agent Execution

The reliable execution of a mobile agent is a very important design issue in building a mobile agent system and many fault-tolerant schemes have been proposed so far. Security is a major problem of mobile agent systems, especially when money transactions are concerned . Security for the partners involved is handled by encryption methods based on a public key authentication mechanism and by secr...

متن کامل

Fault Tolerance in Tandem Computer Systems

Tandem builds single-fault-tolerant computer systems. At the hardware level, the system is designed as a loosely coupled multi-processor with fail-fast modules connected via dual paths. It is designed for online diagnosis and maintenance. A range of CPUs may be inter-connected via a hierarchical fault-tolerant local network. A variety of peripherals needed for online transaction processing are ...

متن کامل

ThunderGeckoMonkey: An Energy-Aware High Performance Secure Computing System

This paper presents ThunderGeckoMonkey, a high-performance, energy-efficient processor aimed at On-Line Transaction Processing (OLTP) workloads. ThunderGeckoMonkey also offers enhanced, transparent fault tolerance and hardware support for a wide range of common encryption and hashing algorithms. A chip multiprocessor, ThunderGeckoMonkey is based on 4issue out-of-order cores, each utilizing adva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014